Automated Malware Analysis Report For
Total Page:16
File Type:pdf, Size:1020Kb
ID: 171 Cookbook: defaultwindowsinteractivecookbook.jbs Time: 19:57:04 Date: 22/07/2021 Version: 33.0.0 White Diamond Table of Contents Table of Contents 2 Windows Analysis Report http://oouutlook.asussa.club/tempfile/239132446c/postscript.php 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Analysis Advice 4 Process Tree 4 Malware Configuration 4 Yara Overview 4 Sigma Overview 4 Jbx Signature Overview 5 Mitre Att&ck Matrix 5 Behavior Graph 5 Screenshots 6 Thumbnails 6 Antivirus, Machine Learning and Genetic Malware Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 7 Domains 7 URLs 7 Domains and IPs 8 Contacted Domains 8 Contacted URLs 8 URLs from Memory and Binaries 8 Contacted IPs 8 Public 8 Private 8 General Information 8 Simulations 9 Behavior and APIs 9 Created / dropped Files 9 Static File Info 40 No static file info 40 Network Behavior 40 Network Port Distribution 40 TCP Packets 40 UDP Packets 40 DNS Queries 40 DNS Answers 40 HTTP Request Dependency Graph 41 HTTP Packets 41 Code Manipulations 42 Statistics 42 Behavior 42 System Behavior 42 Analysis Process: chrome.exe PID: 8056 Parent PID: 2168 42 General 42 File Activities 42 Registry Activities 42 Analysis Process: chrome.exe PID: 4372 Parent PID: 8056 43 General 43 Copyright Joe Security LLC 2021 Page 2 of 43 File Activities 43 Disassembly 43 Code Analysis 43 Copyright Joe Security LLC 2021 Page 3 of 43 Windows Analysis Report http://oouutlook.asussa.club/…tempfile/239132446c/postscript.php Overview General Information Detection Signatures Classification Sample URL: oouutlook.asussa.clu No high impact signatures. b/tempfile/239132446c/pos tscript.php Analysis ID: 171 Infos: Ransomware Most interesting Screenshot: Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Score: 0 Range: 0 - 100 Whitelisted: false Confidence: 60% Analysis Advice Some HTTP requests failed (404). It is likely the sample will exhibit less behavior Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis Process Tree System is start chrome.exe (PID: 8056 cmdline: 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation --single-argument http://oouutlook.asussa.clu b/tempfile/239132446c/postscript.php MD5: 2A7452F3E3165FECBFCCAD71B04E5C37) chrome.exe (PID: 4372 cmdline: 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle= 1704,5941319322075355043,3264521715187937232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 /prefetch:8 MD5: 2A7452F3E3165FECBFCCAD71B04E5C37) cleanup Malware Configuration No configs have been found Yara Overview No yara matches Sigma Overview No Sigma rule has matched Copyright Joe Security LLC 2021 Page 4 of 43 Jbx Signature Overview Click to jump to signature section There are no malicious signatures, click here to show all signatures . Mitre Att&ck Matrix Command Remote Initial Privilege Defense Credential Lateral and Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Effects Effects Impact Valid Windows Path Process Masquerading 1 OS System Remote Data from Exfiltration Encrypted Eavesdrop on Remotely Modify Accounts Management Interception Injection 1 Credential Service Services Local Over Other Channel 2 Insecure Track Device System Instrumentation Dumping Discovery System Network Network Without Partition Medium Communication Authorization Default Scheduled Boot or Boot or Process LSASS Application Remote Data from Exfiltration Non- Exploit SS7 to Remotely Device Accounts Task/Job Logon Logon Injection 1 Memory Window Desktop Removable Over Application Redirect Phone Wipe Data Lockout Initialization Initialization Discovery Protocol Media Bluetooth Layer Calls/SMS Without Scripts Scripts Protocol 3 Authorization Domain At (Linux) Logon Script Logon Obfuscated Files Security Query SMB/Windows Data from Automated Application Exploit SS7 to Obtain Delete Accounts (Windows) Script or Information Account Registry Admin Shares Network Exfiltration Layer Track Device Device Device (Windows) Manager Shared Protocol 4 Location Cloud Data Drive Backups Local At (Windows) Logon Script Logon Binary Padding NTDS System Distributed Input Scheduled Ingress SIM Card Carrier Accounts (Mac) Script Network Component Capture Transfer Tool Swap Billing (Mac) Configuration Object Model Transfer 3 Fraud Discovery Behavior Graph Copyright Joe Security LLC 2021 Page 5 of 43 Hide Legend Behavior Graph Legend: ID: 171 Process URL: http://oouutlook.asussa.clu... Signature Startdate: 22/07/2021 Architecture: WINDOWS Created File Score: 0 DNS/IP Info Is Dropped Is Windows Process g.msn.com g.live.com started Number of created Registry Values Number of created Files Visual Basic chrome.exe Delphi Java 20 435 .Net C# or VB.NET C, C++ or other language Is malicious 169.254.68.153 192.168.2.1 USDOSUS unknown 2 other IPs or domains started Internet Reserved unknown chrome.exe 17 oouutlook.asussa.club clients.l.google.com 162.0.231.234, 50423, 58867, 80 142.250.184.206, 443, 55021 5 other IPs or domains NAMECHEAP-NETUS GOOGLEUS Canada United States Screenshots Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow. Copyright Joe Security LLC 2021 Page 6 of 43 Antivirus, Machine Learning and Genetic Malware Detection Initial Sample Source Detection Scanner Label Link oouutlook.asussa.club/tempfile/239132446c/postscript.php 0% Avira URL Cloud safe Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches URLs Source Detection Scanner Label Link https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extension 0% Avira URL Cloud safe oouutlook.asussa.club/favicon.ico 0% Avira URL Cloud safe oouutlook.asussa.club:80 0% Avira URL Cloud safe https://www.google.com; 0% Avira URL Cloud safe Copyright Joe Security LLC 2021 Page 7 of 43 Domains and IPs Contacted Domains Name IP Active Malicious Antivirus Detection Reputation accounts.google.com 142.250.184.237 true false high clients.l.google.com 142.250.184.206 true false high googlehosted.l.googleusercontent.com 142.250.185.97 true false high oouutlook.asussa.club 162.0.231.234 true false unknown clients2.googleusercontent.com unknown unknown false high g.live.com unknown unknown false high clients2.google.com unknown unknown false high Contacted URLs Name Malicious Antivirus Detection Reputation oouutlook.asussa.club/tempfile/239132446c/postscript.php false unknown oouutlook.asussa.club/favicon.ico false Avira URL Cloud: safe unknown oouutlook.asussa.club/tempfile/239132446c/postscript.php false unknown URLs from Memory and Binaries Contacted IPs Public IP Domain Country Flag ASN ASN Name Malicious 162.0.231.234 oouutlook.asussa.club Canada 22612 NAMECHEAP-NETUS false 239.255.255.250 unknown Reserved unknown unknown false 169.254.68.153 unknown Reserved 6966 USDOSUS false 142.250.184.237 accounts.google.com United States 15169 GOOGLEUS false 142.250.184.206 clients.l.google.com United States 15169 GOOGLEUS false 142.250.185.97 googlehosted.l.googleuser United States 15169 GOOGLEUS false content.com Private IP 192.168.2.1 192.168.2.3 127.0.0.1 General Information Joe Sandbox Version: 33.0.0 White Diamond Analysis ID: 171 Start date: 22.07.2021 Start time: 19:57:04 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 5m 17s Hypervisor based Inspection enabled: false Report type: light Cookbook file name: defaultwindowsinteractivecookbook.jbs Sample URL: oouutlook.asussa.club/tempfile/239132446c/postscript.php Number of analysed new started processes 15 analysed: Copyright Joe Security LLC 2021 Page 8 of 43 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled AMSI enabled Analysis Mode: default Analysis stop reason: Timeout Detection: CLEAN Classification: clean0.win@32/206@6/9 EGA Information: Failed HCA Information: Successful, ratio: 100% Number of executed functions: 0 Number of non-executed functions: 0 Cookbook Comments: Adjust boot time Enable AMSI Warnings: Show All Simulations Behavior and APIs No simulations Created / dropped Files C:\Users\user\AppData\Local\Google\Chrome\User Data\08d56508-8fca-4287-b51a-10cb46f15651.tmp Process: C:\Program Files\Google\Chrome\Application\chrome.exe File Type: ASCII text, with very long lines, with no line terminators Category: dropped Size (bytes): 73911 Entropy (8bit): 6.044205750990472 Encrypted: false SSDEEP: 1536:H1ljbEe6FCerkr+wtf6xJ0SghCsjUtjOjXMWC:H1ZEe6FCerkSwJi0SyRgyjXG MD5: F49904A226AB308C03DE91F1FEF80762 SHA1: DCBAC083D6D6E4273716577908F9CFD54A66E52F SHA-256: 14C4D19DF9E97F458D848BF5060354B9DCF50BCB3E818B6A45ED0DDAC5427590 SHA-512: 15C7978D5DD62C7071369F713BFCDE2C8E4CA9A6403B047769599B70DBABA0B836F7CF79758CDDF1BA6E514875ACE9AC44840FE8E85B3D2FAD46A5A24BD39E 4A Malicious: false Reputation: low Preview: {"browser":{"last_redirect_origin":"","shortcut_migration_version":"91.0.4472.77"},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user ":{"background":{},"foreground":{}}}},"hardware_acceleration_mode_previous":true,"intl":{"app_locale":"en"},"legacy":{"profile":{"name":{"migrated":true}}},"network_time":